Fortinet 561 FortiWeb 5.0 Patch 6 Administration Guide
Table 53: Log&Report > Log Access > Traffic
Not all detected attacks may be blocked, redirected, or sanitized.
For example, while using auto-learning, you can configure protection profiles with an action
of Alert (log but not deny), allowing the connection to complete in order to gather full
auto-learning data.
To determine whether or not an attack attempt was permitted to reach a web server, show
the Action column. For details, see “Displaying & arranging log columns” on page 566.
Additionally, if the FortiWeb appliance is operating in offline protection mode or transparent
inspection mode, due to asynchronous inspection where the attack may have reached the
server before it was detected by FortiWeb, you should also examine the server itself.
Button Description
Refresh Click to update the page with any logs that have been recorded since
you previously loaded the page.
Column Settings Click to display or hide the columns that correspond to log fields, or
change the order in which they appear on the page. For more
information, see “Displaying & arranging log columns” on page 566.